Components of a corporate tablet strategy
- 08 May, 2012 10:53
Information workers (iWorkers) have become used to things working on their device — and working well. They will be highly intolerant of enterprise solutions that do not meet expectations. They will not use the solution and will find creative ways to circumvent the existing systems over and over again.
iWorkers are not concerned with where or how corporate information is stored. The quality, currency and accessibility of the information are what matters.
iWorkers need to be able to access corporate knowledge anytime, anywhere. Not all iWorkers can be guaranteed a responsive network connection, however. As such, any effective corporate mobile solution needs to work regardless of whether or not a device has network connectivity. If a user needs to access information, this will occur regardless of, and perhaps in spite of, the current network status of the device.
Tablet computers now have the ability to store vast amounts of corporate information. Having access to large volumes of information creates its own issues. The information needs to be navigated by the iWorker within the confines of the mobile interface.
iWorkers will demand the ability to be able to switch on their tablet device anywhere and access information in as few steps as possible. This requirement needs a rethink of the simple file system mirroring available in many consumer mobile applications today. Effective mobile solutions allow for a combination of rapid browsing, powerful searching, and the custom flexible grouping together of information.
Successful solutions, therefore, need both effective information management and retrieval solutions, and information replication and synchronisation systems.
iWorkers may be oblivious to the inherent risks in the solutions they provide for themselves through downloads, but the number one issue within any corporate tablet deployment strategy for the CIO will be security. A mobile security analysis must consider security at a variety of levels.
On the device
It is the point where corporate information is most vulnerable. Any tablet computer rollout strategy must employ a variety of techniques including data encryption, enterprise user authentication and authorisation, and the ability to remotely wipe any corporate information stored on the tablet computer.
Over the network
Ensure the secure and encrypted movement of information from the enterprise, across potentially open networks onto the tablet computer.
Within the enterprise
Synchronise an iWorkers enterprise access control permissions with a tablet computer to ensure that changes made to an end user’s access rights to corporate information are both reflected and respected on an iWorkers tablet computer.
Auditing and reporting
Central reporting on corporate information access from device and potentially location is vital.
Download the CIO Australia iPad app CIO Australia for iPad
Follow CIO Australia on Twitter: @CIO_Australia
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Hybrid IT Service Management: A Requirement for Virtualisation and Cloud Computing
When competition is tough and resources are limited, corporate leaders are depending on growing their existing capabilities in order to grow their business. Information technology can be a unique catalyst for business growth, delivering a competitive advantage when creatively applied to established and emerging problems. Read more on what trends are accelerating the value of IT.
Clearing the Clouds for Midmarket Businesses
Cloud computing promises to help midmarket companies reduce cost and complexity in the IT equation – and gain the flexibility and agility they need to thrive. Yet charting a clear course to the cloud isn’t always easy. In this paper, we aim to clear the clouds. We examine different cloud computing models, discuss the types of requirements that each can best address, and consider what midmarket businesses should look for in a cloud solutions provider.
Implementing A Security Analytics Architecture
According to the 2012 Verizon Data Breach Investigations report, 99% of breaches led to data compromise within “days” or less, whereas 85% of breaches took “weeks” or more to discover. This presents a significant challenge to security teams as it grants attackers extended periods of time within a victim’s environment. More “free time” leads to more stolen data and more digital damage. Principally, this is because today’s security measures aren’t designed to counter today’s more advanced threats. Read on.